TWiki > LawNetSoc > TheSirenTriangle (r17 vs. r16) TWiki webs:
Main | TWiki | Sandbox?
LawNetSoc . { Changes | Index | Search | Go } Log In or Register

The Siren Triangle

The government, the media, and the defense industry

By Elliott Ash

Table of Contents

Abstract

The Pentagon's military analyst program is just the latest and most barefaced example of the poorly understood iron triangle comprising government agencies, defense contractors, and media conglomerates. This note traces the mutualistic coevolution of the defense industry and the mass media. Statutes and decisions on propaganda, fraud, false advertising, defense spending, and state secrets are explicated and applied to the industries; conduct. The reciprocal relationships between defense and media laws and the behavior of the defense and media industries are examined. Possible avenues for breaking the triangle are discussed, including greater transparency in defense matters and preservation of competition in media markets.

Body

First shalt thou reach the Sirens; they the hearts
Enchant of all who on their coast arrive.
The wretch, who unforewarn'd approaching, hears
The Sirens' voice, his wife and little- ones
Ne'er fly to gratulate his glad return,
But him the Sirens sitting in the meads
Charm with mellifluous song, while all around
The bones accumulated lie of men
Now putrid, and the skins mould'ring away.

-The Odyssey of Homer

Introduction

Decide whether to organize these sections by line, by point, or by time

The Siren Triangle

Media and Government

Government and Defense Contractors

Defense Contractors and Media

Nexus: The Pentagon's Military Analyst Program

Results

The horrible side effects and counterproductivity of weapons technology. (Kolko 2007 at 18-23) Crimes against humanity: mai lai, abu graib, guantanamo.

Discussion

From a legal perspective, the Siren Triangle is a complicated problem. The tangle of corrupt laws that enable and feed the triangle are numerous, and they aren't all in the most obvious places. From a sociological perspective, the problem is infinitely more complicated: Not only do you have to promulgate the regulatory changes just discussed; you have to make fundamental structural changes in how the government and society function in order to get them passed into law and followed correctly.

But perhaps the so-called "sociological" perspective is not meaningful distinct from the "legal" perspective. Instead, figuring out realistic measures that could help cure the Siren Triangle is just taking a broader legal perspective; the difference being that you recognize that all functions of government and society are fair game for reform. In dealing with monstrous, inertial problems like the Siren Triangle, it might serve to contemplate what the endogenous or exogenous variables are. On a short time frame, one might say that "law" is just an exogenous variable. So the problem-solver works around the law. On a longer time frame, law becomes an endogenous variable to the problem because the actor can take deliberate measures to repeal and revise the law. As the problem's time horizon increases, more variables become endogenous and thus instruments toward solving the problem, things like wealth, technology, prejudice, corporate incumbency, etc. In the very long run, even such apparent monoliths as constitutional provisions and even the human genetic code become endogenous.

The lesson of this discussion, I think, is that dealing with the Siren Triangle requires both short-term and long-term strategies. The short-term should deal with more realistic regulations such as closing the revolving door, prosecuting violations of existing propaganda laws.

More long-term solutions would be increasing transparency.

Very long-term solutions might involve reversing supreme court holdings on executive privilege, the commander-in-chief power, government transparency, freedom of the press, and restoring the requirement that Congress declare war before the executive engages in armed conflict against enemy states. Even more long term, we can relieve pedagogical limitations and even genetic limitations on human cognition and morality that curse human democracies to problems like the Siren Triangle.

Information Transmission

Lieberson (2002) demonstrates that transmission of aesthetic preferences has its own internal logic. The transmission of knowledge has its own internal logic. Some of that is based on human psychology: Some messages are more salient than others as a result of our brain structure (Boyer 2001). Humans appear to prefer truth to falsity, and also the appearance of truth over the appearance of falsity. What other neural mechanisms guide capture and transfer of information? Whatever they are, these evolved mechanisms for information processing are manipulable. Individuals can manipulate others to do their bidding (Dawkins 1982). This process will inevitably result if an entity 1) would benefit from such manipulation, and 2) it has the communicative tools to successfully undertake the manipulation. Humans do this to each other on a daily basis, with varying results. But the entity in this model doesn't have to be a human being. Collective organizations have their own emergent self-interest, and if they have the tools to manipulate humans to their benefit, they will do so. Governments and corporations are prime examples of this phenomenon. Congress will benefit if Americans think that there are no agency costs between citizen and representative--thus, "We are the party of the people." Media corporations will benefit via higher ratings if viewers think they are in danger and that that corporation's media product will give good information about avoiding that danger. This analysis puts the lie to the standard establishmentarian refrain that advertisements provide "information" about products. That is self-evidently false. Advertisements are disinformation--they are manipulation of the brains of the viewer. The upshot is that the actors in the Siren Triangle--the government, the media, and defense contractors--are actively and deliberately manipulating the public sphere to facilitate the production and reproduction of messages that strengthen the Siren Triangle.

The other problem is that while the benefits of the Siren Triangle are fully internalized by the three entities, the costs are distributed over the whole American electorate and, more crucially, citizens the world over. As far as the American citizenry goes, the coordination costs required to organize an effective populist campaign against the components of the Siren Triangle are preventative. But while Americans at least can vote with their ballots and their eyeballs, the rest of the world is out of luck. The costs that are imposed upon other countries are irremediable; neither the US government, the media, nor the defense contractors have to answer to the complaints of foreign citizens.

Scholars who complain of quid pro quo between politicians and defense contractors frame the relationship as that between buyer and seller: The defense contractor buys the vote. Empirical evidence shows that this is the wrong explanation. Instead, defense contractors support those candidates with preexisting ideological predispositions in favor of defense spending. The funding and support helps those candidates ascend to political power, and primaries and elections are just the final processes. Once defense-contractor-friendly individuals are in office, those predispositions are reproduced through path-dependent processes--specifically, those politicians hire and support new politicians with similar views on the defense industry. This process might explain why defense contractors donate to both democrats and republicans in electoral races. A better empirical test would involve examination of defense-contractor donations during primary season; the hypothesis being that the primary candidate that most supports defense spending will be more likely to gain the nomination.

An analogue is the broken promotion process in the intelligence community elucidated by Kolko (2007). Blindly optimistic interpreters of intelligence were promoted by politicians who refused to see failure in Vietnam.

Military Technology and Intellectual Property

Military technology is a peculiar category of intellectual property. When embodied in a weapon, it does not produce net utility. Military technology schemes:

SourceQuotes?

Bibliography

AuthorTitleYearSubjectSummaryLinkup
Barstow, David   NYTimes article on Military Analyst Program DOD 2008 and GAO investigate MAP 2008 MAP MAP     http://www.nytimes.com/2008/04/20/washington/20generals.html?adxnnl=1&adxnnlx=1221408048-NbbOOtV/zAdLhqxAlnmTlw&pagewanted=printhttp://www.nytimes.com/2008/05/24/washington/24generals.html
Merle, Renae Cypher, James Recruiting Uncler Sam The Iron Triangle 2004 2002 MC   News   piece on the revolving door between Pentagon and defense contractors   http://www.thirdworldtraveler.com/Militarization_America/Iron_Triangle.html
Laveele, Tara Cypher, James Globalizing the iron triangle From Military Keynesianism to Neoliberal Militarism 2003 2007 GC   Describes   iron triangle, bureaucracy models; shows how globalization changes these models   http://www.monthlyreview.org/0607jmc.htm
Kellner, Sessions, David The Onward, Persian Gulf TV War Soldiers 1992 2008 GMC MAP Describes media coverage of gulf war Follows up on Barstow's MAP scoop I; discussion of defense/media conglomerates   http://www.slate.com/id/2189545/
Wikipedia Barstow, David "Ada" DOD and GAO investigate MAP   2008   MAP C   Article on "Ada" programming language, used in defense industry computers http://www.nytimes.com/2008/05/24/washington/24generals.htmlhttp://en.wikipedia.org/wiki/Ada_programming_language  
  NYTimes Germany reduces defense spending 2009 Military Budget Bill Passes in Senate 2004 2008 G g   http://query.nytimes.com/gst/fullpage.html?res=9B00EFDC1330F937A25752C0A9629C8B63&sec=&spon=&partner=permalink&exprod=permalink http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc  
Wayne,   Leslie Pentagon Brass and Defense Germany reduces defense spending Contractor Gold 2004 MC G more   on revolving door http://query.nytimes.com/gst/fullpage.html?res=9F07E2DC1538F93AA15755C0A9629C8B63&sec=&spon=&pagewanted=print http://query.nytimes.com/gst/fullpage.html?res=9B00EFDC1330F937A25752C0A9629C8B63&sec=&spon=&partner=permalink&exprod=permalink  
Homer   The Odyssey Defense Industry Daily Web Site     C Sirens   poem, Bk. 12 http://www.bibliomania.com/0/2/223/1101/frameset.html http://www.defenseindustrydaily.com  
CBSA   Defense Inside the Black Budget Data (NYTimes)   2008 MC G Military spending data and tables Information about secret military programs http://www.csbaonline.org/2006-1/2.DefenseBudget/Topline.shtml http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc  
  Defense Industry Daily Web Secret Military Programs Symbols Site   2008 C G   Information about secret military programs http://www.defenseindustrydaily.com http://www.thespacereview.com/article/1033/1  
Kellner, CBSA David Military Correspondents and Defense Budget Data propaganda 2008   GM MC Comparing media coverage of the Military spending data and tables gulf wars, mentions MAP in footnote http://www.ijoc.org/ojs/index.php/ijoc/article/viewFile/266/150 http://www.csbaonline.org/2006-1/2.DefenseBudget/Topline.shtml  
Cypher, James Merle, Renae From Military Keynesianism Recruiting Uncler Sam to Neoliberal Militarism 2007 2004   MC   News piece on the revolving door between Pentagon and defense contractors http://www.monthlyreview.org/0607jmc.htm    
NYTimes Wayne, Leslie 2009 Military Budget Bill Passes in Pentagon Brass and Defense Contractor Gold Senate 2008 2004 g MC   more on revolving door http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc http://query.nytimes.com/gst/fullpage.html?res=9F07E2DC1538F93AA15755C0A9629C8B63&sec=&spon=&pagewanted=print  
  Kellner, David Inside the Black Budget Military Correspondents and propaganda (NYTimes) 2008 G GM Information about secret military programs Comparing media coverage of the gulf wars, mentions MAP in footnote http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc http://www.ijoc.org/ojs/index.php/ijoc/article/viewFile/266/150  
Barstow, David Laveele, Tara NYTimes article on Military Globalizing the iron triangle Analyst Program 2008 2003 MAP GC   Describes iron triangle, bureaucracy models; shows how globalization changes these models http://www.nytimes.com/2008/04/20/washington/20generals.html?adxnnl=1&adxnnlx=1221408048-NbbOOtV/zAdLhqxAlnmTlw&pagewanted=print    
Sessions, Kellner, David Onward, The Persian Gulf TV Soldiers War 2008 1992 MAP GMC Follows up on Barstow's MAP scoop Describes media coverage of gulf war I; discussion of defense/media conglomerates http://www.slate.com/id/2189545/    
  Homer Secret Military The Odyssey Programs Symbols 2008   G   Information about secret military Sirens poem, Bk. 12 programs http://www.thespacereview.com/article/1033/1 http://www.bibliomania.com/0/2/223/1101/frameset.html  
Cypher, Wikipedia James The "Ada" Iron Triangle 2002     G   Article on "Ada" programming language, used in defense industry computers http://www.thirdworldtraveler.com/Militarization_America/Iron_Triangle.html http://en.wikipedia.org/wiki/Ada_programming_language  
  Federal Acquisitions Regulations     Statute regulating government procurements. http://www.acquisition.gov/far/loadmainre.html  

Subject Legend:

 
Attachment sortActionSizeDateWhoComment
else BaseThin.cssmanage 0.2 K 30 Sep 2008 - 23:29 ElliottAsh  
else BaseThin.tmplmanage 0.2 K 30 Sep 2008 - 23:43 ElliottAsh  



Topic TheSirenTriangle . { View | History | Side-by-side | r41 < r40 < r39 < r38 < r37 | More }

Revision r17 - 03 Oct 2008 - 19:33 - ElliottAsh
Revision r16 - 03 Oct 2008 - 03:32 - ElliottAsh

This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.